On Mon, Jan 04, 2016 at 11:23:17AM -0700, Jason Gunthorpe wrote:
> On Sun, Jan 03, 2016 at 07:09:06PM +0200, Jarkko Sakkinen wrote:
> > On Thu, Dec 17, 2015 at 11:23:14AM -0700, Jason Gunthorpe wrote:
> > > include/acpi/actbl2.h is the proper place for these definitions
> &g
On Mon, Jan 04, 2016 at 12:19:43PM -0700, Jerry Snitselaar wrote:
> tpm_tis.c already gets actbl2.h via linux/acpi.h -> acpi/acpi.h ->
> acpi/actbl.h -> acpi/actbl2.h, so the direct include in tpm_tis.c
> is not needed.
>
> Signed-off-by: Jerry Snitselaar <jsnit...@re
ew changes make sense.
>
> Signed-off-by: Jason Gunthorpe <jguntho...@obsidianresearch.com>
> Tested-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
PS. There's one cocci warning. I'll amend the fixup fo
Hi
Could you check the patches that have been authored by you that they
are as you would expect them to be before I tag and merge to my next
branch:
https://github.com/jsakkine/linux-tpmdd/commits/master
Thanks.
/Jarkko
t;)
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm_crb.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
index 1547636..b4d46ae 100644
--- a/drivers/char/tpm/tpm_crb
Support for runtime PM with TPM2 CRB chips such as PTT in Skylake.
Jarkko Sakkinen (3):
tpm_crb: fix crb_req_canceled behavior
tpm, tpm_crb: remove wmb()'s
tpm, tpm_crb: runtime power management
drivers/char/tpm/tpm-interface.c | 3 ++
drivers/char/tpm/tpm_crb.c | 72
wmb()'s are not needed as iowrite32() is used.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm_crb.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
index b4d46ae..ca2cad9 100644
--- a/d
for CRB start (MMIO)
based devices.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 3 ++
drivers/char/tpm/tpm_crb.c | 62 ++--
2 files changed, 63 insertions(+), 2 deletions(-)
diff
On Mon, Jun 06, 2016 at 07:57:13PM +0100, Matthew Garrett wrote:
> Hi,
>
> I'm looking into running a TPM microconference at the Linux Plubmers
> Conference in Santa Fe the first week of November. Right now we have a
> bunch of individual pieces of TPM-related technology, but little overall
>
On Mon, Jun 06, 2016 at 08:37:28PM -0700, Ed Swierk wrote:
> Some TPM chips report bogus command durations in their capabilities,
> just as others report incorrect timeouts. Add an update_durations()
> function and an implementation for tpm_tis, and move the existing
> BCM0102 workaround out of
On Mon, Jun 06, 2016 at 06:48:10PM -0700, Ed Swierk wrote:
> On Mon, Jun 6, 2016 at 6:07 PM, Stefan Berger wrote:
> > Ed Swierk wrote on 06/06/2016 06:27:59 PM:
> > > The occurrence of this excessive command duration depends on the
> > > sequence
'module tpm +p' >/sys/kernel/debug/dynamic_debug/control
>
> on a kernel configured with DYNAMIC_DEBUG=y.
>
> Signed-off-by: Ed Swierk <eswi...@skyportsystems.com>
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
> ---
> drivers/char/tpm/tpm-inte
during init.
>
> Signed-off-by: Ed Swierk <eswi...@skyportsystems.com>
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
PS. Please include at minimum also linux-ker...@vger.kernel.org and
linux-security-mod...@vger.kernel.org for these patches. Thanks.
> ---
On Wed, Jun 08, 2016 at 04:00:17PM -0700, Ed Swierk wrote:
> Some TPM chips report bogus command durations in their capabilities,
> just as others report incorrect timeouts. Rework tpm_get_timeouts()
> to allow chip drivers to override either via a single callback.
> Also clean up handling of TPMs
On Fri, Jun 10, 2016 at 10:34:15AM -0700, Ed Swierk wrote:
> On Fri, Jun 10, 2016 at 5:19 AM, Jarkko Sakkinen
> <jarkko.sakki...@linux.intel.com> wrote:
> > On Wed, Jun 08, 2016 at 04:00:17PM -0700, Ed Swierk wrote:
> >> Some TPM chips report bogus command dura
t;)
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm_crb.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
index 1547636..b4d46ae 100644
--- a/drivers/char/tpm/tpm_crb
On Thu, May 26, 2016 at 09:19:23AM -0400, Stefan Berger wrote:
> Jarkko Sakkinen <jarkko.sakki...@linux.intel.com> wrote on 05/26/2016
>08:26:35 AM:
>
>>
>> Stefan, Peter,
>>
>> Would it be possible for you to smoke test this patc
On Mon, May 16, 2016 at 12:25:47PM -0600, Jason Gunthorpe wrote:
> Provide some flags in tpm_class_ops to allow drivers to opt-in to the
> common startup sequence. This is the sequence used by tpm_tis and
> tpm_crb.
>
> All drivers should set this flag.
>
> Signed-off-by: Jason Gunthorpe
Stefan, Peter,
Would it be possible for you to smoke test this patch set?
I'm very happy with the current version and have tested it myself but
since this is a large infra change inside the subsystem I cannot include
it to a kernel release before it is tested by multiple parties.
/Jarkko
On
Thanks Peter! I'll add your and Stefans Reviewed/Tested-by's before
I merge these to next (will happen around rc5).
/Jarkko
On Sat, May 28, 2016 at 10:59:10AM +0200, Peter Huewe wrote:
> Thanks for all your efforts!!! I'm sorry I couldn't participate more. :(
> So thanks a lot to all of you for
On Mon, Jun 20, 2016 at 03:07:57PM -0600, Jason Gunthorpe wrote:
> On Sun, Jun 19, 2016 at 02:39:24PM +0200, Jarkko Sakkinen wrote:
> > > Signed-off-by: Jason Gunthorpe <jguntho...@obsidianresearch.com>
> > > Tested-by: Andrew Zamansky <andrew.zaman...@nuvo
to the caller.
* Updated tpm_tis to fail in the case of a system error.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 25 +++--
drivers/char/tpm/tpm.h | 3 +--
drivers/char/tpm/tpm2-cmd.c
//tpm_vtpm_proxy.c:559:34:got struct vtpm_proxy_new_dev
*vtpm_new_dev_p
The __user annotation was missing from the corresponding variable.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm_vtpm_proxy.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
On Fri, Jun 10, 2016 at 06:55:06PM -0700, Ed Swierk wrote:
> Some TPM chips report bogus command durations in their capabilities,
> just as others report incorrect timeouts. Rework tpm_get_timeouts() to
> allow chip drivers to override either via a single callback. Also
> clean up handling of TPMs
On Thu, Jun 16, 2016 at 09:57:35PM +0200, Jarkko Sakkinen wrote:
> Hi Thomas,
>
> I'm on a vacation this week but I'll give you quick answers :)
>
> On Tue, Jun 14, 2016 at 04:14:58PM +0300, Tomas Winkler wrote:
> > On Wed, Jun 8, 2016 at 2:02 AM, Jarkko Sakki
function has been already called by the helper if
> there was any error.
>
> Signed-off-by: Sudip Mukherjee <sudip.mukher...@codethink.co.uk>
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
/Jarkko
> ---
> drivers/char/tpm/tpm-chip.c | 8 ---
On Fri, Jun 10, 2016 at 06:55:05PM -0700, Ed Swierk wrote:
> Factor sending the TPM_GetCapability command and validating the result
> from tpm_get_timeouts() into a new function. Return all errors to the
> caller rather than swallowing them (e.g. when tpm_transmit_cmd()
> returns nonzero).
LGTM
On Thu, Jun 16, 2016 at 09:39:38AM -0400, Stefan Berger wrote:
> On 06/16/2016 06:37 AM, Jarkko Sakkinen wrote:
> >When running make C=2 M=drivers/char/tpm/
> >
> > CC [M] drivers/char/tpm//tpm_crb.o
> > CHECK drivers/char/tpm//tpm_vtpm_proxy.c
> >drivers/
On Mon, Jun 20, 2016 at 06:54:02PM -0700, Ed Swierk wrote:
> The STMicro ST19NP18-TPM sometimes takes much longer to execute
> commands than it reports in its capabilities. For example, command 186
> (TPM_FlushSpecific) has been observed to take 14560 msec to complete,
> far longer than the 3000
On Fri, Jun 10, 2016 at 06:55:05PM -0700, Ed Swierk wrote:
> Factor sending the TPM_GetCapability command and validating the result
> from tpm_get_timeouts() into a new function. Return all errors to the
> caller rather than swallowing them (e.g. when tpm_transmit_cmd()
> returns nonzero).
>
>
On Sat, Jun 18, 2016 at 05:10:25PM +0200, Jarkko Sakkinen wrote:
> These patches implement support for runtime PM with TPM2 CRB chips such
> as PTT in Skylake.
>
> This is very naive implementation since the TPM is resumed and supended
> for every transaction thus causing tota
Remove ad-hoc protocol message construction and call instead
tpm1_pcr_read().
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 7 ++-
1 file changed, 2 insertions(+), 5 deletions(-)
diff --git a/drivers/char/tpm/tpm-interfa
It is better to tpm_transmit_cmd() in tpm2_probe() in order to get
consistent command handling throughout the subsystem.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm2-cmd.c | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/d
On Fri, Jun 17, 2016 at 04:39:27PM +0200, Jarkko Sakkinen wrote:
> Jarkko Sakkinen (2):
> tpm_vtpm_proxy: fix address space of a user pointer in
> vtpmx_fops_ioctl()
> tpm_crb: fix address space of the return pointer in crb_map_res()
Merged to ne
Isn't tpm2_probe() call now twice in tpm_tis initialization?
On Mon, Jun 20, 2016 at 01:07:09PM +0300, andrew zamansky wrote:
> Signed-off-by: Andrew Azmansky
> ---
> drivers/char/tpm/tpm_tis.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git
wmb()'s are not needed as iowrite32() is used.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm_crb.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
index 8819ef7..0c8ed7f 100644
--- a/d
for CRB start (MMIO)
based devices.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 3 +++
drivers/char/tpm/tpm_crb.c | 50 ++--
2 files changed, 51 insertions(+), 2 deletions(-)
diff
.
Jarkko Sakkinen (3):
tpm_crb: fix crb_req_canceled behavior
tpm, tpm_crb: remove wmb()'s
tpm, tpm_crb: runtime power management
drivers/char/tpm/tpm-interface.c | 3 ++
drivers/char/tpm/tpm_crb.c | 60 +++-
2 files changed, 56 insertions(+), 7
//tpm_vtpm_proxy.c:559:34:got struct vtpm_proxy_new_dev
*vtpm_new_dev_p
The __user annotation was missing from the corresponding variable.
Fixes: 794c38e01358 ("tpm: Proxy driver for supporting multiple emulated TPMs")
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
T
Jarkko Sakkinen (2):
tpm_vtpm_proxy: fix address space of a user pointer in
vtpmx_fops_ioctl()
tpm_crb: fix address space of the return pointer in crb_map_res()
drivers/char/tpm/tpm_crb.c| 2 +-
drivers/char/tpm/tpm_vtpm_proxy.c | 2 +-
2 files changed, 2 insertions(+), 2
On Thu, Jan 14, 2016 at 01:42:26PM +, David Howells wrote:
> Jarkko Sakkinen <jarkko.sakki...@linux.intel.com> wrote:
>
> > > Is the TPM emulator likely to go upstream at any point? Or is it waiting
> > > for some sort of update?
> >
> > Saw K
Gave more consistent name tpm1_pcr_read() as the TPM2 version is called
tpm2_pcr_read().
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 4 ++--
drivers/char/tpm/tpm-sysfs.c | 2 +-
drivers/char/tpm/tpm.h | 2 +-
3
Remove ad-hoc protocol message construction and call instead
tpm1_pcr_read().
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 7 ++-
1 file changed, 2 insertions(+), 5 deletions(-)
diff --git a/drivers/char/tpm/tpm-interfa
Migrated into single tpm_gen_interrupt() function and cleaned up the
whole construction in general because it was starting to turn into a
train wreck.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 23 ++-
driver
Return error code from tpm_gen_interrupt() and fail tpm_tis family of
drivers on a system error. It doesn't make sense to continue if we
cannot even reach the TPM.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm-interface.c | 6 +++---
drivers/ch
Removed unnecessary externs from tpm.h.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm.h | 40
1 file changed, 20 insertions(+), 20 deletions(-)
diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h
declarations in
tpm.h as suggested by Jason Gunthorpe.
Jarkko Sakkinen (6):
tpm: remove unnecessary externs from tpm.h
tpm: unify tpm_gen_interrupt()
tpm: return error code from tpm_gen_interrupt()
tpm: use tpm_transmit_cmd() in tpm2_probe()
tpm: rename tpm_pcr_read_dev() to tpm1_pcr_read
On Fri, Jun 24, 2016 at 02:43:00PM -0400, Stefan Berger wrote:
> On 06/24/2016 01:48 PM, Jason Gunthorpe wrote:
> >On Fri, Jun 24, 2016 at 10:36:55AM -0400, Stefan Berger wrote:
> >>Introduce TPM_VTPM_PROXY_NO_SYSFS flag that prevents a vtpm_proxy driver
> >>instance from having the typical sysfs
On Fri, Jun 24, 2016 at 12:27:27PM -0600, Jason Gunthorpe wrote:
> On Tue, Jun 21, 2016 at 06:10:28PM -0700, Ed Swierk wrote:
>
> > if (chip->ops->req_canceled(chip, status)) {
> > dev_err(chip->pdev, "Operation Canceled\n");
> > +
On Fri, Jun 24, 2016 at 01:30:24PM -0600, Jason Gunthorpe wrote:
> On Fri, Jun 17, 2016 at 11:10:43PM +0200, Jarkko Sakkinen wrote:
> > extern int tpm_get_timeouts(struct tpm_chip *);
> > -extern void tpm_gen_interrupt(struct tpm_chip *);
> > +void tpm_gen_inte
Hi Jason,
On Fri, Jun 24, 2016 at 12:25:15PM -0600, Jason Gunthorpe wrote:
> > expected = be32_to_cpu(*(__be32 *) (buf + 2));
> > if (expected > count) {
> > + dev_err(chip->pdev, "Response too long (wanted %zd, got %d)\n",
> > + count, expected);
>
> This all
On Sat, Jun 25, 2016 at 06:24:30PM +0300, Jarkko Sakkinen wrote:
> On Fri, Jun 24, 2016 at 02:26:15PM -0600, Jason Gunthorpe wrote:
> > On Fri, Jun 24, 2016 at 11:21:31PM +0300, Jarkko Sakkinen wrote:
> > > Hmm... Do you mean by 4 month old stuff the stuff that is in mainline
&
Hi
I'm in the process of building buildroot env for testing tpmdd:
http://git.infradead.org/users/jjs/buildroot-tpmdd.git
This is still very much WiP so except it to be rebased often.
The idea is to be able to quickly create a kernel + working user space
that lives inside initramfs for testing
On Thu, Feb 04, 2016 at 04:49:47PM -0700, Jason Gunthorpe wrote:
> On Wed, Feb 03, 2016 at 03:37:01PM -0800, Jarkko Sakkinen wrote:
> > Hi
> >
> > I've been investigating this bug:
> >
> > https://bugzilla.kernel.org/show_bug.cgi?id=111511
> >
> >
On Wed, Feb 10, 2016 at 07:38:52PM -0500, Stefan Berger wrote:
>Jason Gunthorpe wrote on 02/10/2016
>05:23:13 PM:
>
>>
>>
>> >> We shouldn't artificially limit the number of devices if
>> >> virtualization is the target. Use an
)
tpmdd fixes for Linux 4.5 (updated)
Jarkko Sakkinen (3):
tpm: fix checks for policy digest existence in tpm2_seal_trusted()
tpm: fix the rollback in tpm_chip_register()
tpm: fix the cleanup of struct
On Tue, Feb 09, 2016 at 09:52:28AM -0700, Jason Gunthorpe wrote:
> On Tue, Feb 09, 2016 at 11:19:15AM -0500, Stefan Berger wrote:
> > Jason Gunthorpe wrote on 02/09/2016
> > 12:33:23
> > AM:
> >
> >
> > >
> > > On Mon, Feb 08, 2016 at 02:27:07PM -0500, Stefan
ian conversion on the size and tried
> to output the event data from the copied version, which has only have
> one byte of the data, resulting in garbage event data.
>
> Signed-off-by: Harald Hoyer <har...@redhat.com>
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.
On Wed, Feb 10, 2016 at 12:15:44AM -0500, Stefan Berger wrote:
> Jarkko Sakkinen <jarkko.sakki...@linux.intel.com> wrote on 02/09/2016
>10:56:20 PM:
>
>>
>> On Tue, Feb 09, 2016 at 09:52:28AM -0700, Jason Gunthorpe wrote:
>> > On Tue, Feb
On Fri, Feb 05, 2016 at 11:28:57AM -0800, Jarkko Sakkinen wrote:
> On Fri, Feb 05, 2016 at 10:42:58AM -0700, Jason Gunthorpe wrote:
> > On Fri, Feb 05, 2016 at 08:47:04AM -0800, Jarkko Sakkinen wrote:
> >
> > > Right, thanks for the explanation and I'm able to reproduce
On Wed, Feb 10, 2016 at 02:22:27PM +0200, Jarkko Sakkinen wrote:
> On Fri, Feb 05, 2016 at 11:28:57AM -0800, Jarkko Sakkinen wrote:
> > On Fri, Feb 05, 2016 at 10:42:58AM -0700, Jason Gunthorpe wrote:
> > > On Fri, Feb 05, 2016 at 08:47:04AM -0800, Jarkko Sakkinen wrote:
&g
"\\_SB.GPO2", 0x00, ResourceConsumer, ,)
> { // Pin list
> 0x0002,
> }
> })
> Return (SBUF) /* \_SB_.SPI1.TPM1._CRS.SBUF */
> }
> Method (_STA, 0, NotSerialized) // _STA: Status
On Tue, Feb 09, 2016 at 10:26:57AM +0100, Christophe Ricard wrote:
> Extend copyright header to 2016
>
> Signed-off-by: Christophe Ricard <christophe-h.ric...@st.com>
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
/Jarkko
> ---
> drivers/char/tp
On Thu, Feb 11, 2016 at 12:34:15PM -0700, Jason Gunthorpe wrote:
> On Tue, Feb 09, 2016 at 05:30:30AM +0200, Jarkko Sakkinen wrote:
> > If the initialization fails before tpm_chip_register(), put_device()
> > will be not called, which causes release callback not to be called.
>
attribute to keep the session intact
after a successful unseal operation thus making the behavior consistent.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
Fixes: 5beb0c435b ("keys, trusted: seal with a TPM2 authorization policy")
---
drivers/char/tpm/tpm2-cmd.c |
From: Jason Gunthorpe <jguntho...@obsidianresearch.com>
This was missed during the struct device conversion, we
need to hold a kref on the chip to make sure it isn't freed.
Signed-off-by: Jason Gunthorpe <jguntho...@obsidianresearch.com>
Reviewed-by: Jarkko Sakkinen &
Control area does not always fall in the range of memory resource given
by the ACPI object. This patch fixes the issue by ioremapping the
buffers if this is the case.
Fixes: bb76f9ba49 ("tpm_crb: Use devm_ioremap_resource")
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@li
I'm moving tpmdd in near future (probably soon after 4.5 has been
tagged) to git.infradead.org. I guess this won't be a too big fuzz for
anyone? You can expect this not to happen before Linus tags v4.5.
/Jarkko
--
On Tue, Feb 02, 2016 at 04:13:53PM -0700, Jason Gunthorpe wrote:
> On Sat, Jan 30, 2016 at 06:05:42PM -0800, Jarkko Sakkinen wrote:
> > The release-callback is not used before the device is attached to the
> > device hierarchy. This caused resources not to cleanup properly if the
&g
device in tpmm_chip_alloc().
Fixes: 313d21eeab ("tpm: device class for tpm")
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
cc: sta...@vger.kernel.org
---
drivers/char/tpm/tpm-chip.c | 43 ---
1 file changed, 24 insertions(
On Wed, Jan 27, 2016 at 11:24:48AM -0700, Jason Gunthorpe wrote:
> On Wed, Jan 27, 2016 at 06:22:39AM -0800, Jarkko Sakkinen wrote:
>
> > Also, I'm wondering is it right to have this as a separate module or
> > should this be part of the core TPM infrastructure?
>
>
On Fri, Feb 19, 2016 at 07:42:03AM -0500, Stefan Berger wrote:
> From: Jason Gunthorpe
>
> tpm_chip_alloc becomes a typical subsystem allocate call.
Maybe a more verbose commit message?
>
> Signed-off-by: Jason Gunthorpe
> ---
On Mon, Feb 22, 2016 at 12:11:48PM -0700, Jason Gunthorpe wrote:
> On Mon, Feb 22, 2016 at 09:08:28PM +0200, Jarkko Sakkinen wrote:
> > On Mon, Feb 22, 2016 at 10:52:45AM -0700, Jason Gunthorpe wrote:
> > > On Mon, Feb 22, 2016 at 04:50:23PM +0200, Jarkko Sakkinen wrote:
> &
On Fri, Feb 19, 2016 at 07:42:02AM -0500, Stefan Berger wrote:
> Get rid of the locking of the module
>
> Signed-off-by: Stefan Berger
I tend to think that this should have been part of the previous patch
with the description in the commit message why the
y of the code. The kref on the parent is held
> by the device core during device_add and dropped in device_del
>
> Signed-off-by: Jason Gunthorpe <jguntho...@obsidianresearch.com>
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
There was couple of places where I would ad
On Tue, Feb 23, 2016 at 07:09:44AM -0500, Stefan Berger wrote:
> Jarkko Sakkinen <jarkko.sakki...@linux.intel.com> wrote on 02/23/2016
>05:22:11 AM:
>
>> > +struct vtpm_dev {
>> > + struct tpm_chip *chip;
>> > +
>> > +
On Fri, Feb 19, 2016 at 07:42:06AM -0500, Stefan Berger wrote:
> This patch implements a driver for supporting multiple emulated TPMs in a
> system.
>
> The driver implements a device /dev/vtpmx that is used to created
> a client device pair /dev/tpmX (e.g., /dev/tpm10) and a server side that
>
On Mon, Feb 22, 2016 at 12:56:53PM +1100, James Morris wrote:
> On Sat, 20 Feb 2016, Jarkko Sakkinen wrote:
>
> > Hi James,
> >
> > I'm sorry for the late pull request for 4.5. The reason for this was
> > the latency in my previous one. I picked with care the ab
On Mon, Feb 22, 2016 at 03:13:28PM -0700, Jason Gunthorpe wrote:
> On Mon, Feb 22, 2016 at 11:14:14PM +0200, Jarkko Sakkinen wrote:
> > On Fri, Feb 19, 2016 at 07:42:03AM -0500, Stefan Berger wrote:
> > > From: Jason Gunthorpe <jguntho...@obsidianresearch.com>
> > &
On Fri, Feb 19, 2016 at 07:42:01AM -0500, Stefan Berger wrote:
> From: Jason Gunthorpe
>
> Add a read/write semaphore around the ops function pointers so
> ops can be set to null when the driver un-registers.
>
> Previously the tpm core expected module locking
On Tue, Feb 23, 2016 at 12:52:46PM -0700, Jason Gunthorpe wrote:
> On Tue, Feb 23, 2016 at 09:40:14PM +0200, Jarkko Sakkinen wrote:
>
> > > echo 1 > /sys/.../remove
> > >
> > > Is basically the same as a module unload without requiring module
> > >
On Mon, Feb 22, 2016 at 03:20:17PM -0700, Jason Gunthorpe wrote:
> > I'm just thinking is the try_module_get() and module_put() even
> > necessary after this change? You know that device is not unregistered
> > from chip->ops field, which is protected by that RW-semaphore.
>
> The module locking
On Mon, Feb 22, 2016 at 03:20:17PM -0700, Jason Gunthorpe wrote:
> On Mon, Feb 22, 2016 at 11:08:59PM +0200, Jarkko Sakkinen wrote:
> > On Fri, Feb 19, 2016 at 07:42:01AM -0500, Stefan Berger wrote:
> > > From: Jason Gunthorpe <jguntho...@obsidianresearch.com>
>
On Tue, Feb 23, 2016 at 10:25:39PM +0100, Christophe Ricard wrote:
> Hi Jarkko,
>
> kbuild robot feedbacks few issues with patch 10 & 12. I am sending back the
> whole series again.
>
> - a set of code style or sanity cleanup
> - acpi device probing support for i2c and spi phys.
>
> In v2, i
On Wed, Feb 24, 2016 at 06:10:42PM -0500, Stefan Berger wrote:
>Jason Gunthorpe wrote on 02/22/2016
>09:17:30 PM:
>
>>
>> On Mon, Feb 22, 2016 at 08:45:51PM -0500, Stefan Berger wrote:
>>
>> > Two things:
>> > - the ioctl takes flags;
On Mon, Feb 29, 2016 at 12:29:50PM -0500, Stefan Berger wrote:
> Now that the tpm core has strong locking around 'ops' it is possible
> to remove a TPM driver, module and all, even while user space still
> has things like /dev/tpmX open. For consistency and simplicity, drop
> the module locking
On Mon, Feb 29, 2016 at 03:30:35PM -0500, Stefan Berger wrote:
> Jarkko Sakkinen <jarkko.sakki...@linux.intel.com> wrote on 02/29/2016
>03:24:01 PM:
>
>>
>> On Mon, Feb 29, 2016 at 12:29:46PM -0500, Stefan Berger wrote:
>> > The following
On Mon, Feb 29, 2016 at 10:48:46PM +0200, Jarkko Sakkinen wrote:
> On Mon, Feb 29, 2016 at 03:30:35PM -0500, Stefan Berger wrote:
> > Jarkko Sakkinen <jarkko.sakki...@linux.intel.com> wrote on 02/29/2016
> >03:24:01 PM:
> >
> >>
> >> On
"\\_SB.GPO2", 0x00, ResourceConsumer, ,)
> { // Pin list
> 0x0002,
> }
> })
> Return (SBUF) /* \_SB_.SPI1.TPM1._CRS.SBUF */
> }
> Method (_STA, 0, NotSerialized) // _STA: Status
>
On Sat, Feb 13, 2016 at 04:15:23PM +0100, Christophe Ricard wrote:
> Hi Peter, Jarko,
>
> Please find in the following serie:
> - a set of code style or sanity cleanup
> - acpi device probing support for i2c and spi phys.
>
> In v2, i have:
> - Added Jarkko review
> - Fixed a warning on patch 12
On Thu, Jan 14, 2016 at 11:01:55AM -0500, Stefan Berger wrote:
> From: Stefan Berger
>
> Introduce 2 new flags that prevent the registration of TPM devices
> with sysfs and securityfs. None of the exising devices set these flags.
Maybe a better name for this flag
Call put_device() and return error code if devm_add_action() fails.
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
Reported-by: Jason Gunthorpe <jguntho...@obsidianresearch.com>
Fixes: 8e0ee3c9faed ("tpm: fix the cleanup of struct tpm_chip")
---
drivers/c
data, resulting in garbage event data.
Signed-off-by: Harald Hoyer <har...@redhat.com>
Fixes: 0cc698af36ff ("vTPM: support little endian guests")
Reviewed-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
cc: sta...@vger.kernel.org
---
drivers/char/tpm/tpm_eventlo
The memory was not zeroed for new_res, which caused
devm_ioremap_resource() not to use dev_name() but instead whatever
garbage was pointed by new_res->name.
The problem crb_check_resource is different. There not zeroing the
name pointer causes use-after-free.
Signed-off-by: Jarkko Sakki
On Tue, Feb 16, 2016 at 09:52:19PM -0700, Jason Gunthorpe wrote:
> On Wed, Feb 17, 2016 at 02:27:54AM +0200, Jarkko Sakkinen wrote:
> > - if (acpi_dev_resource_memory(ares, ))
> > + if (acpi_dev_resource_memory(ares, )) {
> > + res.name = NULL;
>
>
-dbff : tpm0
Signed-off-by: Jarkko Sakkinen <jarkko.sakki...@linux.intel.com>
---
drivers/char/tpm/tpm_crb.c | 93 ++
1 file changed, 45 insertions(+), 48 deletions(-)
diff --git a/drivers/char/tpm/tpm_crb.c b/drivers/char/tpm/tpm_crb.c
index 1
On Thu, Feb 18, 2016 at 11:03:31AM -0700, Jason Gunthorpe wrote:
> On Wed, Feb 17, 2016 at 01:23:31PM +0200, Jarkko Sakkinen wrote:
> > At the moment for tpm_crb /proc/iomem shows the HW interface and not the
> > device using the memory range. This patch fixes the issue by associa
On Thu, Feb 18, 2016 at 10:03:35PM +0100, Christophe Ricard wrote:
> Hi Jarkko,
>
> Thanks for your feedback :)
>
> On 18/02/2016 15:46, Jarkko Sakkinen wrote:
> >On Thu, Feb 18, 2016 at 08:12:45AM +0100, Christophe Ricard wrote:
> >>Hi Jarkko,
> >>
> &
)
remaining tpmdd fixes for Linux 4.5
Harald Hoyer (1):
tpm_eventlog.c: fix binary_bios_measurements
Jarkko Sakkinen (4):
tpm: fix: set continueSession attribute for the unseal operation
tpm: fix: return rc when
On Fri, Feb 12, 2016 at 05:04:29PM -0700, Jason Gunthorpe wrote:
> This was missed during the struct device conversion, we
> need to hold a kref on the chip to make sure it isn't freed.
>
> Signed-off-by: Jason Gunthorpe
I'm bit confused about this patch. What
1 - 100 of 1181 matches
Mail list logo